47 research outputs found

    Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization

    Full text link
    Physical-layer based key generation schemes exploit the channel reciprocity for secret key extraction, which can achieve information-theoretic secrecy against eavesdroppers. Such methods, although practical, have been shown to be vulnerable against man-in-the-middle (MitM) attacks, where an active adversary, Mallory, can influence and infer part of the secret key generated between Alice and Bob by injecting her own packet upon observing highly correlated channel/RSS measurements from Alice and Bob. As all the channels remain stable within the channel coherence time, Mallory's injected packets cause Alice and Bob to measure similar RSS, which allows Mallory to successfully predict the derived key bits. To defend against such a MitM attack, we propose to utilize a reconfigurable antenna at one of the legitimate transceivers to proactively randomize the channel state across different channel probing rounds. The randomization of the antenna mode at every probing round breaks the temporal correlation of the channels from the adversary to the legitimate devices, while preserving the reciprocity of the channel between the latter. This prevents key injection from the adversary without affecting Alice and Bob's ability to measure common randomness. We theoretically analyze the security of the protocol and conduct extensive simulations and real-world experiments to evaluate its performance. Our results show that our approach eliminates the advantage of an active MitM attack by driving down the probability of successfully guessing bits of the secret key to a random guess.Comment: 13 pages, 8 figures, 4 table

    PoF: Proof-of-Following for Vehicle Platoons

    Full text link
    Cooperative vehicle platooning significantly improves highway safety and fuel efficiency. In this model, a set of vehicles move in line formation and coordinate functions such as acceleration, braking, and steering using a combination of physical sensing and vehicle-to-vehicle (V2V) messaging. The authenticity and integrity of the V2V messages are paramount to highway safety. For this reason, recent V2V and V2X standards support the integration of a PKI. However, a PKI cannot bind a vehicle's digital identity to the vehicle's physical state (location, heading, velocity, etc.). As a result, a vehicle with valid cryptographic credentials can impact the platoon by creating "ghost" vehicles and injecting false state information. In this paper, we seek to provide the missing link between the physical and the digital world in the context of verifying a vehicle's platoon membership. We focus on the property of following, where vehicles follow each other in a close and coordinated manner. We aim at developing a Proof-of-Following (PoF) protocol that enables a candidate vehicle to prove that it follows a verifier within the typical platooning distance. The main idea of the proposed PoF protocol is to draw security from the common, but constantly changing environment experienced by the closely traveling vehicles. We use the large-scale fading effect of ambient RF signals as a common source of randomness to construct a PoF primitive. The correlation of large-scale fading is an ideal candidate for the mobile outdoor environment because it exponentially decays with distance and time. We evaluate our PoF protocol on an experimental platoon of two vehicles in freeway, highway, and urban driving conditions. In such realistic conditions, we demonstrate that the PoF withstands both the pre-recording and following attacks with overwhelming probability.Comment: 19 pages, 24 figures, 1 tabl

    Effectiveness of Multidomain Dormitory Environment and Roommate Intervention for Improving Sleep Quality of Medical College Students: A Cluster Randomised Controlled Trial in China

    Get PDF
    Medical students are vulnerable to sleep disorders, which could be further exaggerated by poor dormitory environment and roommate behaviour. However, there is little evidence of whether dormitory environment intervention is effective in improving the sleep quality of medical college students in developing countries. The present study aimed to evaluate the effects of a comprehensive multidomain intervention on dormitory environment and roommate behaviour among medical college students in China. In this cluster randomised controlled trial, a total of 106 dormitories (364 students) were randomly allocated into an intervention group (55 dormitories, 193 students) and a control group (51 dormitories, 171 students). The intervention group received a three-month intervention with multiple components to improve or adapt to sleep environments in dormitories; the control group received no intervention. Primary and secondary outcomes were measured at study enrolment and three months later for both groups. The linear mixed-effects models showed that, compared with the control group, the intervention was associated with a significantly decreased Pittsburgh Sleep Quality Index (β = −0.67, p = 0.012), and a marginally significant effect on reducing roommates’ influence on sleep schedule (β = −0.21, p = 0.066). Students in the intervention group rated “making dormitory sleep rules” and “wearing eye masks” as the most effective intervention measures. These findings could contribute to the limited body of scientific evidence about sleep intervention in Chinese medical students and highlight the importance of dormitory sleep environments in maintaining sleep quality

    In situ interface engineering for probing the limit of quantum dot photovoltaic devices.

    Get PDF
    Quantum dot (QD) photovoltaic devices are attractive for their low-cost synthesis, tunable band gap and potentially high power conversion efficiency (PCE). However, the experimentally achieved efficiency to date remains far from ideal. Here, we report an in-situ fabrication and investigation of single TiO2-nanowire/CdSe-QD heterojunction solar cell (QDHSC) using a custom-designed photoelectric transmission electron microscope (TEM) holder. A mobile counter electrode is used to precisely tune the interface area for in situ photoelectrical measurements, which reveals a strong interface area dependent PCE. Theoretical simulations show that the simplified single nanowire solar cell structure can minimize the interface area and associated charge scattering to enable an efficient charge collection. Additionally, the optical antenna effect of nanowire-based QDHSCs can further enhance the absorption and boost the PCE. This study establishes a robust 'nanolab' platform in a TEM for in situ photoelectrical studies and provides valuable insight into the interfacial effects in nanoscale solar cells

    Robust estimation of bacterial cell count from optical density

    Get PDF
    Optical density (OD) is widely used to estimate the density of cells in liquid culture, but cannot be compared between instruments without a standardized calibration protocol and is challenging to relate to actual cell count. We address this with an interlaboratory study comparing three simple, low-cost, and highly accessible OD calibration protocols across 244 laboratories, applied to eight strains of constitutive GFP-expressing E. coli. Based on our results, we recommend calibrating OD to estimated cell count using serial dilution of silica microspheres, which produces highly precise calibration (95.5% of residuals <1.2-fold), is easily assessed for quality control, also assesses instrument effective linear range, and can be combined with fluorescence calibration to obtain units of Molecules of Equivalent Fluorescein (MEFL) per cell, allowing direct comparison and data fusion with flow cytometry measurements: in our study, fluorescence per cell measurements showed only a 1.07-fold mean difference between plate reader and flow cytometry data

    Isometric Manifold Learning Using Hierarchical Flow

    No full text
    We propose the Hierarchical Flow (HF) model constrained by isometric regularizations for manifold learning that combines manifold learning goals such as dimensionality reduction, inference, sampling, projection and density estimation into one unified framework. Our proposed HF model is regularized to not only produce embeddings preserving the geometric structure of the manifold, but also project samples onto the manifold in a manner conforming to the rigorous definition of projection. Theoretical guarantees are provided for our HF model to satisfy the two desired properties. In order to detect the real dimensionality of the manifold, we also propose a two-stage dimensionality reduction algorithm, which is a time-efficient algorithm thanks to the hierarchical architecture design of our HF model. Experimental results justify our theoretical analysis, demonstrate the superiority of our dimensionality reduction algorithm in cost of training time, and verify the effect of the aforementioned properties in improving performances on downstream tasks such as anomaly detection

    Disentangled Information Bottleneck

    No full text
    The information bottleneck (IB) method is a technique for extracting information that is relevant for predicting the target random variable from the source random variable, which is typically implemented by optimizing the IB Lagrangian that balances the compression and prediction terms. However, the IB Lagrangian is hard to optimize, and multiple trials for tuning values of Lagrangian multiplier are required. Moreover, we show that the prediction performance strictly decreases as the compression gets stronger during optimizing the IB Lagrangian. In this paper, we implement the IB method from the perspective of supervised disentangling. Specifically, we introduce Disentangled Information Bottleneck (DisenIB) that is consistent on compressing source maximally without target prediction performance loss (maximum compression). Theoretical and experimental results demonstrate that our method is consistent on maximum compression, and performs well in terms of generalization, robustness to adversarial attack, out-of-distribution detection, and supervised disentangling
    corecore